<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-tong-idr-bgp-ls-sav-rule-03" category="std" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="BGP-LS for Advertising SAV Rules">Advertisement of Multi-Sourced SAV Rules using BGP Link-State</title>
    <seriesInfo name="Internet-Draft" value="draft-tong-idr-bgp-ls-sav-rule-03"/>
    <author initials="T." surname="Tong" fullname="Tian Tong">
      <organization>China Unicom</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tongt5@chinaunicom.cn</email>
      </address>
    </author>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <author initials="N." surname="Wang" fullname="Nan Wang">
      <organization>China Unicom</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>wangn161@chinaunicom.cn</email>
      </address>
    </author>
    <author initials="S." surname="Zhuang" fullname="Shunwan Zhuang">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>zhuangshunwan@huawei.com</email>
      </address>
    </author>
    <author initials="J." surname="Zhao" fullname="Jing Zhao">
      <organization>China Unicom</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>zhaoj501@chinaunicom.cn</email>
      </address>
    </author>
    <date year="2026" month="January" day="04"/>
    <area>rtg</area>
    <workgroup>idr</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 72?>
<t>This document describes the protocol extensions of BGP Link-State to collect source address validation (SAV) rules generated by different protocols/mechanisms, to facilitate multi-sourced SAV rules monitoring and management.</t>
    </abstract>
  </front>
  <middle>
    <?line 75?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>Source Address Validation (SAV) can efficiently prevent source address spoofing-based attacks. SAV rules, which indicate the valid/invalid incoming interfaces of a specific source IP address or source IP prefix, are installed on routers for checking the source addresses of received packets.</t>
      <t>SAV rules can be generated by static configuration, management tools, or based on different routing protocols such as OSPFv2, OSPFv3, IS-IS, BGP, or their extensions <xref target="I-D.ietf-savnet-intra-domain-architecture"/><xref target="I-D.ietf-savnet-inter-domain-architecture"/>. Due to the requirements of application scenarios, a router may use more than one tool at the same time to obtain SAV rules. Therefore, the rules on the router will be multi-sourced, which complicates management. What is more challenging is that there may exist conflicts among these multi-sourced rules and the rules can be dynamic.</t>
      <t>To facilitate SAV rules monitoring and management, this document proposes to extend BGP-LS (<xref target="RFC9552"/>) for advertising SAV rules on routers to a centralized server. The centralized server can effectively collect multi-sourced SAV rules from routers. For the purpose of advertising SAV rules within BGP-LS advertisements, two new NLRIs called SAV Rule NLRIs are proposed for IPv4 and IPv6, respectively.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="sec-nlri">
      <name>BGP-LS NLRI Advertisement for SAV Rules</name>
      <t>The "Link-State NLRI" defined in <xref target="RFC9552"/> is extended to carry the SAV rule information. The format of "Link-State NLRI" is defined in <xref target="RFC9552"/> as follows:</t>
      <figure anchor="fig-nlri">
        <name>Link-State NLRI</name>
        <artwork><![CDATA[
    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |            NLRI Type          |     Total NLRI Length         |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |                                                               |
    //                  Link-State NLRI (variable)                 //
    |                                                               |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
      </figure>
      <t>This document defines two new NLRI Types known as SAV Rule NLRIs (values are TBD) for the advertisement of SAV rule Information.</t>
      <section anchor="sav-rule-nlris">
        <name>SAV Rule NLRIs</name>
        <t>This document defines SAV Rule NLRI Types with their common format as shown in the following figure:</t>
        <figure anchor="fig-rule-nlri">
          <name>BGP-LS SAV Rule NLRI</name>
          <artwork><![CDATA[
    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
    +-+-+-+-+-+-+-+-+
    |  Protocol-ID  |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |                           Identifier                          |
    +                           (8 octets)                          +
    |                                                               |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    //            Local Node Descriptors TLVs (variable)            //
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    //            SAV Rule Descriptors TLVs (variable)             //
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <t>The fields are defined as follows:</t>
        <ul spacing="normal">
          <li>
            <t>Protocol-ID: Specifies the source of SAV rules in this NLRI. Protocol-ID values defined in [RFC9552][RFC9086] can be reused.</t>
          </li>
          <li>
            <t>Identifier: An 8 octet value as defined in <xref target="RFC9552"/>.</t>
          </li>
          <li>
            <t>Local Node Descriptors TLV: Contains Node Descriptors for the nodes storing SAV rules. This is a mandatory TLV in SAV Rule NLRIs. The Type is 256. The length of this TLV is variable. The value contains one or more Node Descriptor sub-TLVs defined in <xref target="RFC9552"/>.</t>
          </li>
          <li>
            <t>SAV Rule Descriptors TLVs: There can be one or more SAV Rule Descriptors TLVs for carrying SAV rules.</t>
          </li>
        </ul>
      </section>
      <section anchor="sav-rule-descriptors-tlvs">
        <name>SAV Rule Descriptors TLVs</name>
        <t>The SAV Rule Descriptor field is a set of TLV triplets. SAV Rule Descriptors TLVs identify a set of SAV rules having the same set of valid interfaces as defined in <xref target="I-D.ietf-savnet-general-sav-capabilities"/>. The following TLVs are valid as SAV Rule Descriptors in the SAV Rule NLRI:</t>
        <figure anchor="fig-rule-descriptor">
          <name>SAV Rule Descriptor TLVs</name>
          <artwork><![CDATA[
    +-------------+---------------------+----------+
    |   TLV Code  | Description         |  Length  |
    |    Point    |                     |          |
    +-------------+---------------------+----------+
    |     TBD     | Interface Name      | variable |
    |     TBD     | Interface Group     |    4     |
    |     TBD     | SAV Prefix          | variable |
    +-------------+---------------------+----------+
]]></artwork>
        </figure>
        <section anchor="sec-intf-name-tlv">
          <name>Interface Name TLV</name>
          <t>An Interface Name TLV is used to identify one valid interface of the source prefixes carried in SAV Prefix TLVs. The format of Interface Name TLV is as follows:</t>
          <figure anchor="fig-intf-name-tlv">
            <name>Interface Name TLV</name>
            <artwork><![CDATA[
      0                   1                   2                   3
      0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     |              Type             |             Length            |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     //                     Interface Name    (variable)            //
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
          </figure>
          <t>There can be zero, one or more Interface Name TLVs in the SAV Rule Descriptor field.</t>
        </section>
        <section anchor="sec-intf-group-tlv">
          <name>Interface Group TLV</name>
          <t>An Interface Group TLV is to identify a group of valid interfaces of the source prefixes carried in SAV Prefix TLVs. The format of Interface Group TLV is as follows:</t>
          <figure anchor="fig-intf-group-tlv">
            <name>Interface Group TLV</name>
            <artwork><![CDATA[
    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |              Type             |             Length            |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    //                       Interface Group (4 octets)            //
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
          </figure>
          <t>The Interface Group value can have either a local meaning or a global meaning. On the one hand, it can be a local interface property on the target routers, and the meaning of it depends on the configurations of network administrator <xref target="I-D.ietf-idr-flowspec-interfaceset"/>. On the other hand, a global meaning Group Identifier field carries an AS number, which represents all the interfaces connected to the neighboring AS with the AS number. <xref target="I-D.geng-idr-flowspec-sav"/></t>
          <t>Interface Group value can also be an Interface ID for identifying a specific interface.</t>
          <t>There can be zero, one or more Interface Group TLVs in the SAV Rule Descriptor field. Interface Group TLVs can be used together with Interface Name TLVs.</t>
          <t>When there is neither an Interface Name TLV nor an Interface Group TLV, the source prefixes carried in SAV Prefix TLVs are considered valid for all the interfaces on the router.</t>
        </section>
        <section anchor="sec-prefix-tlv">
          <name>SAV Prefix TLV</name>
          <t>A SAV Prefix TLV carries one IP address prefix (IPv4 or IPv6). The format of SAV Prefix TLV is as follows:</t>
          <figure anchor="fig-sav-prefix-tlv">
            <name>SAV Prefix TLV</name>
            <artwork><![CDATA[
    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |              Type             |             Length            |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    | Prefix Length | IP Prefix (variable)                         //
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
          </figure>
          <t>There can be one or more SAV Prefix TLVs in the SAV Rule Descriptor field. The IPv4 SAV Prefix TLVs will only appear in the IPv4 SAV Rule NLRI, and The IPv6 SAV Prefix TLVs are only for the IPv6 SAV Rule NLRI</t>
          <t>There can be more than one SAV mechanisms based on the same source (identified by Protocol-ID). In order to distinguish the different sources of rules in a more fine-grained manner, the Type field needs to be allocated for multiple values, and each value identifies a specific SAV mechanism based on the same source identified by Protocol-ID.</t>
          <!-- The type field can be extended in the future. A mode field can be added in the future -->

</section>
      </section>
    </section>
    <section anchor="sec-attr">
      <name>BGP-LS Attribute for SAV Mode</name>
      <t>The BGP-LS Attribute, an optional and non-transitive BGP Attribute, is used to carry the validation mode information of SAV rules {I-D.ietf-savnet-general-sav-capabilities}. The following SAV Mode Attribute TLV is defined for the BGP-LS Attribute associated with a SAV Rule NLRI:</t>
      <figure anchor="fig-sav-mode-tlv">
        <name>SAV Mode TLV</name>
        <artwork><![CDATA[
   0                   1                   2                   3
   0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  |              Type             |             Length            |
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  |M  |  Reserved |
  +-+-+-+-+-+-+-+-+
]]></artwork>
      </figure>
      <t>The SAV Mode TLV carries a Mode Flag (M flag is shown in the figure and occupies two bits) describing the validation mode attribute.</t>
      <ul spacing="normal">
        <li>
          <t>When M flag is set to 00, the mode is IBA-SAV: interface-based prefix allowlist. The NLRI carries the source prefixes and interfaces. Only the carried prefixes are valid on the carried interfaces, and any other prefixes are invalid on these interfaces.</t>
        </li>
        <li>
          <t>When M flag is set to 01, the mode is IBB-SAV: interface-based prefix blocklist. The NLRI carries the source prefixes and interfaces. Only the carried prefixes are invalid on the carried interfaces, and any other prefixes are valid on these interfaces.</t>
        </li>
        <li>
          <t>When M flag is set to 10, the mode is PBA-SAV: prefix-based interface allowlist. The NLRI carries the source prefixes and interfaces. Only the carried interfaces are valid for the carried prefixes, and any other interfaces are invalid for those prefixes. Any other prefixes will not be validated.</t>
        </li>
        <li>
          <t>When M flag is set to 11, the mode is PBB-SAV: prefix-based interface blocklist. The NLRI carries the source prefixes and interfaces. Only the carried interfaces are invalid for the carried prefixes, and any other interfaces are valid for those prefixes. Any other prefixes will not be validated.</t>
        </li>
      </ul>
    </section>
    <section anchor="bgp-ls-attribute-for-sav-actions">
      <name>BGP-LS Attribute for SAV Actions</name>
      <t>SAV actions in this document adopt the traffic filtering actions defined in [RFC8955] and [RFC8956].</t>
      <t>Traffic filtering actions defined in [RFC 8955] include traffic-rate-bytes, traffic-rate-packets, traffic-action, rt-redirect, and traffic-marking, which are applicable to IPv4 and IPv6. Rt-redirect-ipv6 is a new traffic filtering action defined in [RFC 8956], which is applicable to IPv6. The encapsulation formats of SAV actions are consistent with the encapsulation formats defined in [RFC 8955] and [RFC 8956].</t>
      <t>A SAV rule may match multiple SAV actions, and there may be conflicts among these SAV actions. Section 7.7 of [RFC 8955] describes the conflicts among Traffic filtering actions.</t>
    </section>
    <section anchor="example-of-validation-modes-and-sav-rule-nlri-configuration">
      <name>Example of Validation Modes and SAV rule NLRI Configuration</name>
      <t>In this section, we provide examples of how to configure SAV rule NLRI for the four validation modes. 
The SAV rule NLRI can carry zero, one, or multiple interfaces/interface groups and one or more prefixes.</t>
      <section anchor="iba-sav-interface-based-prefix-allowlist">
        <name>IBA-SAV: Interface-based prefix allowlist</name>
        <t>In this mode, only the prefixes carried in the SAV rule NLRI are considered valid on the specified interface. 
All other prefixes arriving at this interface are considered invalid.</t>
        <t>Example:</t>
        <ul spacing="normal">
          <li>
            <t>SAV rule NLRI: prefix = 192.168.1.0/24, interfaces = [Interface A]</t>
          </li>
          <li>
            <t>Validation: Any packet with a source prefix of 192.168.1.0/24 arriving at Interface A is valid. All other prefixes on Interface A are invalid.</t>
          </li>
        </ul>
      </section>
      <section anchor="ibb-sav-interface-based-prefix-blocklist">
        <name>IBB-SAV: Interface-based prefix blocklist</name>
        <t>In this mode, the prefixes carried in the SAV rule NLRI are considered invalid on the specified interface. 
All other prefixes arriving at this interface are considered valid.</t>
        <t>Example:</t>
        <ul spacing="normal">
          <li>
            <t>SAV rule NLRI: prefix = 10.0.0.0/8, interfaces = [Interface B]</t>
          </li>
          <li>
            <t>Validation: Any packet with a source prefix of 10.0.0.0/8 arriving at Interface B is invalid. All other prefixes on Interface B are valid.</t>
          </li>
        </ul>
      </section>
      <section anchor="pba-sav-prefix-based-interface-allowlist">
        <name>PBA-SAV: Prefix-based interface allowlist</name>
        <t>In this mode, for a specific source prefix, only the interfaces carried in the SAV rule NLRI are considered valid. 
Packets with this source prefix arriving at other interfaces are invalid. Other prefixes are not checked.</t>
        <t>Example:</t>
        <ul spacing="normal">
          <li>
            <t>SAV rule NLRI: prefix = 172.16.0.0/16, interfaces = [Interface C, Interface D]</t>
          </li>
          <li>
            <t>Validation: Packets with a source prefix of 172.16.0.0/16 are valid only if they arrive at Interface C or Interface D. 
This prefix arriving at other interfaces is invalid. Other prefixes are not checked.</t>
          </li>
        </ul>
      </section>
      <section anchor="pbb-sav-prefix-based-interface-blocklist">
        <name>PBB-SAV: Prefix-based interface blocklist</name>
        <t>In this mode, for a specific source prefix, the interfaces carried in the SAV rule NLRI are considered invalid. 
Packets with this source prefix arriving at other interfaces are valid. Other prefixes are not checked.</t>
        <t>Example:</t>
        <ul spacing="normal">
          <li>
            <t>SAV rule NLRI: prefix = 192.168.2.0/24, interfaces = [Interface E]</t>
          </li>
          <li>
            <t>Validation: Packets with a source prefix of 192.168.2.0/24 arriving at Interface E are invalid. This prefix arriving at other interfaces is valid. Other prefixes are not checked.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="procedures">
      <name>Procedures</name>
      <t>SAV rules only exist on the routers running SAV mechanisms/protocols and the controller, these routers are usually access routers or boundary routers. This document describes extensions to the BGP-LS NLRI. The Routers running SAV mechanisms/protocols establish BGP-LS sessions with the controller respectively to report multi-sourced SAV rules.</t>
      <figure anchor="fig-advertisement-of-sav-rules">
        <name>Advertisement of SAV Rules using BGP-LS</name>
        <artwork><![CDATA[
                    +--------------------------+
                    |        Controller        |
                    +--------------------------+
                      /                      \       
                     /                        \  BGP-LS advertisements for SAV Rule NLRIs +-----------------------/--------------------------\-----------------+ |   AS100              /                            \                |   |                  +---------+                +---------+            |  |                  | Router1 | -------------- | Router2 |            |  |                  +---------+                +---------+            |   |                     |                              |               | |                     |                              |               | |                     |                              |               | |                     |                              |               | |                  +---------+                +---------+            |  |                  | Router3 | -------------- | Router4 |            |   |                  +---------+                +---------+            |  |                                                                    |   +--------------------------------------------------------------------+
]]></artwork>
      </figure>
      <t>Based on Figure 8, the process of reporting SAV rules via BGP-LS is described as follows:
Step 1: R1 and R2 run SAV mechanism/protocol, and generate multi-sourced SAV rules.
Step 2: R1 and R2 respectively establish BGP-LS sessions with the controller.
Step 3: R1 and R2 generate BGP-LS advertisements for the SAV Rule NLRIs.
Step 4: R1 and R2 report multi-sourced SAV rules to the controller through the sav rule NLRIs (as defined in Section 2). This enables the controller to monitor and manage multi-sourced SAV rules.</t>
    </section>
    <section anchor="manageability-considerations">
      <name>Manageability Considerations</name>
      <t>The Existing BGP operational and management procedures apply to this document. No new procedures are defined in this document. The considerations as specified in <xref target="RFC9552"/> apply to this document.</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>This section describes the code point allocation by IANA for this document.</t>
      <section anchor="bgp-ls-nlri-types-registry">
        <name>"BGP-LS NLRI-Types" registry</name>
        <t>This document requests assigning code-points from the registry for SAV Rule NLRIs:</t>
        <artwork><![CDATA[
+------+---------------------------+
| Type | NLRI Type                 |
+------+---------------------------+
| TBD  | IPv4 SAV Rule NLRI        |
| TBD  | IPv6 SAV Rule NLRI        |
+------+---------------------------+
]]></artwork>
      </section>
      <section anchor="bgp-ls-sav-rule-descriptors-tlvs-registry">
        <name>"BGP-LS SAV Rule Descriptors TLVs" registry</name>
        <t>This document requests assigning code-points from the registry for BGP-LS SAV Rule Descriptors TLVs based on <xref target="fig-rule-descriptor"/>.</t>
      </section>
      <section anchor="bgp-ls-sav-mode-attribute-tlv-registry">
        <name>"BGP-LS SAV Mode Attribute TLV" registry</name>
        <t>This document requests assigning a code-point from the registry for the BGP-LS SAV Mode attribute TLV.</t>
      </section>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>Procedures and protocol extensions defined in this document do not affect the base BGP security model. See [RFC6952] for details. The security considerations of the base BGP-LS specification as described in <xref target="RFC9552"/> also apply.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9552" target="https://www.rfc-editor.org/info/rfc9552" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9552.xml">
          <front>
            <title>Distribution of Link-State and Traffic Engineering Information Using BGP</title>
            <author fullname="K. Talaulikar" initials="K." role="editor" surname="Talaulikar"/>
            <date month="December" year="2023"/>
            <abstract>
              <t>In many environments, a component external to a network is called upon to perform computations based on the network topology and the current state of the connections within the network, including Traffic Engineering (TE) information. This is information typically distributed by IGP routing protocols within the network.</t>
              <t>This document describes a mechanism by which link-state and TE information can be collected from networks and shared with external components using the BGP routing protocol. This is achieved using a BGP Network Layer Reachability Information (NLRI) encoding format. The mechanism applies to physical and virtual (e.g., tunnel) IGP links. The mechanism described is subject to policy control.</t>
              <t>Applications of this technique include Application-Layer Traffic Optimization (ALTO) servers and Path Computation Elements (PCEs).</t>
              <t>This document obsoletes RFC 7752 by completely replacing that document. It makes some small changes and clarifications to the previous specification. This document also obsoletes RFC 9029 by incorporating the updates that it made to RFC 7752.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9552"/>
          <seriesInfo name="DOI" value="10.17487/RFC9552"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-general-sav-capabilities" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-general-sav-capabilities-02" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-general-sav-capabilities.xml">
          <front>
            <title>General Source Address Validation Capabilities</title>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Weiqiang Cheng" initials="W." surname="Cheng">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="10" month="October" year="2025"/>
            <abstract>
              <t>The SAV rules of existing source address validation (SAV) mechanisms, are derived from other core data structures, e.g., FIB-based uRPF, which are not dedicatedly designed for source filtering. Therefore there are some limitations related to deployable scenarios and traffic handling policies. To overcome these limitations, this document introduces the general SAV capabilities from data plane perspective. How to implement the capabilities and how to generate SAV rules are not in the scope of this document.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-general-sav-capabilities-02"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ietf-savnet-intra-domain-architecture" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-intra-domain-architecture-03" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-intra-domain-architecture.xml">
          <front>
            <title>Intra-domain Source Address Validation (SAVNET) Architecture</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="13" month="October" year="2025"/>
            <abstract>
              <t>This document specifies the architecture of intra-domain SAVNET, which aims to achieve accurate source address validation (SAV) at external interfaces of an intra-domain network in an automated manner. It describes the conceptual design of intra-domain SAVNET, along with its use cases and design requirements, to help ensure that the intended objectives are met.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-intra-domain-architecture-03"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-inter-domain-architecture" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-inter-domain-architecture-02" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-inter-domain-architecture.xml">
          <front>
            <title>Inter-domain Source Address Validation (SAVNET) Architecture</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Libin Liu" initials="L." surname="Liu">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="31" month="August" year="2025"/>
            <abstract>
              <t>This document introduces an inter-domain SAVNET architecture for performing AS-level SAV and provides a comprehensive framework for guiding the design of inter-domain SAV mechanisms. The proposed architecture empowers ASes to generate SAV rules by sharing SAV- specific information between themselves, which can be used to generate more accurate and trustworthy SAV rules in a timely manner compared to the general information. During the incremental or partial deployment of SAV-specific information, it can utilize general information to generate SAV rules, if an AS's SAV-specific information is unavailable. Rather than delving into protocol extensions or implementations, this document primarily concentrates on proposing SAV-specific and general information and guiding how to utilize them to generate SAV rules. To this end, it also defines some architectural components and their relations.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-inter-domain-architecture-02"/>
        </reference>
        <reference anchor="I-D.ietf-idr-flowspec-interfaceset" target="https://datatracker.ietf.org/doc/html/draft-ietf-idr-flowspec-interfaceset-06" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-idr-flowspec-interfaceset.xml">
          <front>
            <title>Applying BGP flowspec rules on a specific interface-set</title>
            <author fullname="Stephane Litkowski" initials="S." surname="Litkowski">
              <organization>Cisco</organization>
            </author>
            <author fullname="Adam Simpson" initials="A." surname="Simpson">
              <organization>Nokia</organization>
            </author>
            <author fullname="Keyur Patel" initials="K." surname="Patel">
              <organization>Arrcus, Inc</organization>
            </author>
            <author fullname="Jeffrey Haas" initials="J." surname="Haas">
              <organization>HPE</organization>
            </author>
            <date day="2" month="September" year="2025"/>
            <abstract>
              <t>The BGP Flow Specification (flowspec) Network Layer Reachability Information (BGP NLRI) extension ([RFC8955]) is used to distribute traffic flow specifications into BGP. The primary application of this extension is the distribution of traffic filtering policies for the mitigation of distributed denial of service (DDoS) attacks. By default, flow specification filters are applied on all forwarding interfaces that are enabled for use by the BGP flowspec extension. A network operator may wish to apply a given filter selectively to a subset of interfaces based on an internal classification scheme. Examples of this include "all customer interfaces", "all peer interfaces", "all transit interfaces", etc. This document defines BGP Extended Communities ([RFC4360]) that permit such filters to be selectively applied to sets of forwarding interfaces sharing a common group identifier. The BGP Extended Communities carrying this group identifier are referred to as the BGP Flowspec "interface-set" Extended Communities.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-idr-flowspec-interfaceset-06"/>
        </reference>
        <reference anchor="I-D.geng-idr-flowspec-sav" target="https://datatracker.ietf.org/doc/html/draft-geng-idr-flowspec-sav-06" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.geng-idr-flowspec-sav.xml">
          <front>
            <title>BGP Flow Specification for Source Address Validation</title>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="tongtian124" initials="" surname="tongtian124">
              <organization>China Unicom</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="17" month="October" year="2025"/>
            <abstract>
              <t>BGP FlowSpec reuses BGP route to distribute infrastructure and propagates traffic flow information with filtering actions. This document proposes some extensions to BGP FlowSpec for disseminating SAV rules.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-geng-idr-flowspec-sav-06"/>
        </reference>
      </references>
    </references>
    <?line 371?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
